Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged exploits

Rss Feed Group items tagged

Paul Merrell

The Orwellian Re-Branding of "Mass Surveillance" as Merely "Bulk Collection" - The Inte... - 0 views

  • Just as the Bush administration and the U.S. media re-labelled “torture” with the Orwellian euphemism “enhanced interrogation techniques” to make it more palatable, the governments and media of the Five Eyes surveillance alliance are now attempting to re-brand “mass surveillance” as “bulk collection” in order to make it less menacing (and less illegal). In the past several weeks, this is the clearly coordinated theme that has arisen in the U.S., UK, Canada, Australia and New Zealand as the last defense against the Snowden revelations, as those governments seek to further enhance their surveillance and detention powers under the guise of terrorism.
  • This manipulative language distortion can be seen perfectly in yesterday’s white-washing report of GCHQ mass surveillance from the servile rubber-stamp calling itself “The Intelligence and Security Committee of the UK Parliament (ISC)”(see this great Guardian Editorial this morning on what a “slumbering” joke that “oversight” body is). As Committee Member MP Hazel Blears explained yesterday (photo above), the Parliamentary Committee officially invoked this euphemism to justify the collection of billions of electronic communications events every day. The Committee actually acknowledged for the first time (which Snowden documents long ago proved) that GCHQ maintains what it calls “Bulk Personal Datasets” that contain “millions of records,” and even said about pro-privacy witnesses who testified before it: “we recognise their concerns as to the intrusive nature of bulk collection.” That is the very definition of “mass surveillance,” yet the Committee simply re-labelled it “bulk collection,” purported to distinguish it from “mass surveillance,” and thus insist that it was all perfectly legal.
  • This re-definition game goes as follows: yes, we vacuum up and store literally as much of the internet as we possibly can. Then we analyze all the data about what you’re doing, with whom you’re speaking, and who your network of associates is. Based on that analysis of all of you and your activities, we then read the communications that we want (with virtually no checks and concealing from you what percentage of it we’re reading), and store as much of the rest of it as technology permits for future trolling. But don’t worry: we’re only reading the Bad People’s emails. So run along then: no mass surveillance here. Just bulk collection! It’s not mass surveillance, but “enhanced collection techniques.”  One of the many facts that made the re-defining of “torture” so corrupt and indisputably invalid was that there was long-standing law making clear that exactly these interrogation techniques used by the U.S. government were torture and thus illegal. The same is true of this obscene attempt to re-define “mass surveillance” as nothing more than mere innocent “bulk collection.”
  • ...2 more annotations...
  • As Caspar Bowden points out, EU law is crystal clear that exactly what these agencies are doing constitutes illegal mass surveillance. From the 2000 decision of the European Court of Human Rights in Amann v. Switzerland, which found a violation of the right to privacy guaranteed by Article 8 of the European Convention on Human Rights and rejected the defense from the government that no privacy violation occurs if the data is not reviewed or exploited: The Court reiterates that the storing of data relating to the “private life” of an individual falls within the application of Article 8 § 1  . . . . The Court reiterates that the storing by a public authority of information relating to an individual’s private life amounts to an interference within the meaning of Article 8. The subsequent use of the stored information has no bearing on that finding (emphasis added). A separate 2000 ruling found a violation of privacy rights even when the government is merely storing records regarding one’s activities undertaken in public (such as attending demonstrations), because “public information can fall within the scope of private life where it is systematically collected and stored in files held by the authorities.” That’s why an EU Parliamentary Inquiry into the Snowden revelations condemned NSA and GCHQ spying in the “strongest possible terms,” pointing out that it was classic “mass surveillance” and thus illegal. That’s the same rationale that led a U.S. federal court to conclude that mass metatdata collection was very likely an unconstitutional violation of the privacy rights in the Fourth Amendment.
  • By itself, common sense should prevent any of these governments from claiming that sweeping up, storing, and analyzing much of the internet – literally examining billions of communications activities every week of entire populations – is something other than “mass surveillance.” Yet this has now become the coordinated defense from the governments in the U.S., the UK, Canada, New Zealand and Australia. It’s nothing short of astonishing to watch them try to get away with this kind of propagnadistic sophistry. (In the wake of our reports with journalist Nicky Hager on GCSB, watch the leader of New Zealand’s Green Party interrogate the country’s flailing Prime Minister this week in Parliament about this completely artificial distinction). But – just as it was stunning to watch media outlets refuse to use the term “torture” because the U.S. Government demanded that it be called something else – this Orwellian switch in surveillance language is now predictably (and mindlessly) being adopted by those nations’ most state-loyal media outlets.
Paul Merrell

What's Scarier: Terrorism, or Governments Blocking Websites in its Name? - The Intercept - 0 views

  • Forcibly taking down websites deemed to be supportive of terrorism, or criminalizing speech deemed to “advocate” terrorism, is a major trend in both Europe and the West generally. Last month in Brussels, the European Union’s counter-terrorism coordinator issued a memo proclaiming that “Europe is facing an unprecedented, diverse and serious terrorist threat,” and argued that increased state control over the Internet is crucial to combating it. The memo noted that “the EU and its Member States have developed several initiatives related to countering radicalisation and terrorism on the Internet,” yet argued that more must be done. It argued that the focus should be on “working with the main players in the Internet industry [a]s the best way to limit the circulation of terrorist material online.” It specifically hailed the tactics of the U.K. Counter-Terrorism Internet Referral Unit (CTIRU), which has succeeded in causing the removal of large amounts of material it deems “extremist”:
  • In addition to recommending the dissemination of “counter-narratives” by governments, the memo also urged EU member states to “examine the legal and technical possibilities to remove illegal content.” Exploiting terrorism fears to control speech has been a common practice in the West since 9/11, but it is becoming increasingly popular even in countries that have experienced exceedingly few attacks. A new extremist bill advocated by the right-wing Harper government in Canada (also supported by Liberal Party leader Justin Trudeau even as he recognizes its dangers) would create new crimes for “advocating terrorism”; specifically: “every person who, by communicating statements, knowingly advocates or promotes the commission of terrorism offences in general” would be a guilty and can be sent to prison for five years for each offense. In justifying the new proposal, the Canadian government admits that “under the current criminal law, it is [already] a crime to counsel or actively encourage others to commit a specific terrorism offence.” This new proposal is about criminalizing ideas and opinions. In the government’s words, it “prohibits the intentional advocacy or promotion of terrorism, knowing or reckless as to whether it would result in terrorism.”
  • If someone argues that continuous Western violence and interference in the Muslim world for decades justifies violence being returned to the West, or even advocates that governments arm various insurgents considered by some to be “terrorists,” such speech could easily be viewed as constituting a crime. To calm concerns, Canadian authorities point out that “the proposed new offence is similar to one recently enacted by Australia, that prohibits advocating a terrorist act or the commission of a terrorism offence-all while being reckless as to whether another person will engage in this kind of activity.” Indeed, Australia enacted a new law late last year that indisputably targets political speech and ideas, as well as criminalizing journalism considered threatening by the government. Punishing people for their speech deemed extremist or dangerous has been a vibrant practice in both the U.K. and U.S. for some time now, as I detailed (coincidentally) just a couple days before free speech marches broke out in the West after the Charlie Hebdo attacks. Those criminalization-of-speech attacks overwhelmingly target Muslims, and have resulted in the punishment of such classic free speech activities as posting anti-war commentary on Facebook, tweeting links to “extremist” videos, translating and posting “radicalizing” videos to the Internet, writing scholarly articles in defense of Palestinian groups and expressing harsh criticism of Israel, and even including a Hezbollah channel in a cable package.
  • ...2 more annotations...
  • Beyond the technical issues, trying to legislate ideas out of existence is a fool’s game: those sufficiently determined will always find ways to make themselves heard. Indeed, as U.S. pop star Barbra Streisand famously learned, attempts to suppress ideas usually result in the greatest publicity possible for their advocates and/or elevate them by turning fringe ideas into martyrs for free speech (I have zero doubt that all five of the targeted sites enjoyed among their highest traffic dates ever today as a result of the French targeting). But the comical futility of these efforts is exceeded by their profound dangers. Who wants governments to be able to unilaterally block websites? Isn’t the exercise of this website-blocking power what has long been cited as reasons we should regard the Bad Countries — such as China and Iran — as tyrannies (which also usually cite “counterterrorism” to justify their censorship efforts)?
  • s those and countless other examples prove, the concepts of “extremism” and “radicalizing” (like “terrorism” itself) are incredibly vague and elastic, and in the hands of those who wield power, almost always expand far beyond what you think it should mean (plotting to blow up innocent people) to mean: anyone who disseminates ideas that are threatening to the exercise of our power. That’s why powers justified in the name of combating “radicalism” or “extremism” are invariably — not often or usually, but invariably — applied to activists, dissidents, protesters and those who challenge prevailing orthodoxies and power centers. My arguments for distrusting governments to exercise powers of censorship are set forth here (in the context of a prior attempt by a different French minister to control the content of Twitter). In sum, far more damage has been inflicted historically by efforts to censor and criminalize political ideas than by the kind of “terrorism” these governments are invoking to justify these censorship powers. And whatever else may be true, few things are more inimical to, or threatening of, Internet freedom than allowing functionaries inside governments to unilaterally block websites from functioning on the ground that the ideas those sites advocate are objectionable or “dangerous.” That’s every bit as true when the censors are in Paris, London, and Ottawa, and Washington as when they are in Tehran, Moscow or Beijing.
Paul Merrell

How Netanyahu provoked this war with Gaza | +972 Magazine - 0 views

  • On Monday of last week, June 30, Reuters ran a story that began:Prime Minister Benjamin Netanyahu accused Hamas on Monday of involvement, for the first time since a Gaza war in [November] 2012, in rocket attacks on Israel and threatened to step up military action to stop the strikes. So even by Israel’s own reckoning, Hamas had not fired any rockets in the year-and-a-half since “Operation Pillar of Defense” ended in a ceasefire. (Hamas denied firing even those mentioned by Netanyahu last week; it wasn’t until Monday of this week that it acknowledged launching any rockets at Israel since the 2012 ceasefire.) So how did we get from there to here, here being Operation Protective Edge, which officially began Tuesday with 20 Gazans dead, both militants and civilians, scores of others badly  wounded and much destruction, alongside about 150 rockets flying all over Israel (but no serious injuries or property damage by Wednesday afternoon)? We got here because Benjamin Netanyahu brought us here. He’s being credited in Israel for showing great restraint in the days leading up to the big op, answering Gaza’s rockets with nothing more than warning shots and offering “quiet for quiet.” But in fact it was his antagonism toward all Palestinians – toward Mahmoud Abbas’ Palestinian Authority no less than toward Hamas – that started and steadily provoked the chain reaction that led to the current misery.
  • And nobody knows this, or should know it, better than the Obama administration, which is now standing up for Israel’s “right to defend itself.” It was Netanyahu and his government that killed the peace talks with Abbas that were shepherded by U.S. Secretary of State John Kerry; the Americans won’t exactly spell this out on-the-record, but they will off-the record. So a week before those negotiations’ April 29 deadline, Abbas, seeing he wasn’t getting anywhere playing ball with Israel and the United States, decided to shore things up at home, to end the split between the West Bank and Gaza, and he signed the Fatah-Hamas unity deal – with himself as president and Fatah clearly the senior partner. The world – even Washington – welcomed the deal, if warily so, saying unity between the West Bank and Gaza was a good thing for the peace process, and holding out the hope that the deal would compel Hamas to moderate its political stance. Netanyahu, however, saw red. Warning that the unity government would “strengthen terror,” he broke off talks with Abbas and tried to convince the West to refuse to recognize the emerging new Palestinian government – but he failed. He didn’t stop trying, though. At a time when Hamas was seen to be weak, broke, throttled by the new-old Egyptian regime, unpopular with Gazans, and acting as Israel’s cop in the Strip by not only holding its own fire but curbing that of Islamic Jihad and others, Netanyahu became obsessed with Hamas – and obsessed with tying it around Abbas’ neck. Netanyahu’s purpose, clearly enough, was to shift the blame for the failure of the U.S.-sponsored peace talks from himself and his government to Abbas and the Palestinians.
  • But Netanyahu used the kidnappings to go after Hamas in the West Bank. The target, as one Israeli security official said, was “anything green.” The army raided, destroyed, confiscated and arrested anybody and anything having to do with Hamas, killed some Palestinian protesters and rearrested some 60 Hamasniks who had been freed in the Gilad Shalit deal, throwing them back in prison. Meanwhile, in Gaza, Israel had already escalated matters on June 11, the day before the kidnappings, by killing not only a wanted man riding on a bicycle, but a 10-year-old child riding with him. Between that, the kidnappings a day later and the crackdown on Hamas in the West Bank that immediately followed, Gaza and Israel started going at it pretty fierce – with all the casualties and destruction, once again, on Gaza’s side only.
  • ...3 more annotations...
  • But it wasn’t working. Then on June 12 something fell into Netanyahu’s lap which he certainly would have prevented if he’d been able to, but which he also did not hesitate exploiting to the hilt politically: the kidnapping in the West Bank of Gilad Sha’ar and Naftali Fraenkel, both 16, and Eyal Yifrah, 19. Netanyahu blamed Hamas for the kidnapping. He said he had proof. To this day, neither he nor any other Israeli official has come forward with a shred of proof. Meanwhile, it is now widely assumed that the Hamas leadership did not give the order for the kidnapping, that it was instead carried out at the behest of a renegade, Hamas-linked, Hebron clan with a long history of blowing up Hamas’ ceasefires with Israel by killing Israelis. Besides, it made no sense for Hamas leaders to order up such a spectacular crime – not after signing an agreement with Abbas, and not when they were so badly on the ropes.
  • And that was basically it. Netanyahu had given orders to smash up the West Bank and Gaza over the kidnapping of three Israeli boys that, as monstrous as it was, apparently had nothing to do with the Hamas leadership. Thus, he opened an account with Israel’s enemies, who would wish for an opportunity to close it. On June 30, the bodies of the three kidnapped Israeli boys were found in the West Bank. “Hamas is responsible, Hamas will pay,” Netanayhu intoned. That payment was delayed by the burning alive of Mohammed Abu Khdeir, 15, which set off riots in East Jerusalem and Israel’s “Arab Triangle,” and which put Israel on the defensive. It probably encouraged the armed groups in Gaza to step up their rocketing of Israel, while Netanyahu kept Israel’s in check. Then on Sunday, as many as nine Hamas men were killed in a Gazan tunnel that Israel bombed, saying it was going to be used for a terror attack. The next day nearly 100 rockets were fired at Israel. This time Hamas took responsibility for launching some of the rockets – a week after Netanyahu, for the first time since November 2012, accused it of breaking the ceasefire. And the day after that, “Operation Protective Edge” officially began. By Wednesday afternoon, there were 35 dead and many maimed in Gaza, Israelis were ducking rockets, and no one can say when or how it will end, or what further horrors lie in store.
  • Netanyahu could have avoided the whole thing. He could have chosen not to shoot up the West Bank and Gaza and arrest dozens of previously freed Hamasniks (along with hundreds of other Palestinians) over what was very likely a rogue kidnapping. Before that, he could have chosen not to stonewall Abbas for nine months of peace negotiations, and then there wouldn’t have even been a unity government with Hamas that freaked him out so badly – a reaction that was, of course, Netanyahu’s choice as well. But Israel’s prime minister is and always has been at war with the Palestinians – diplomatically, militarily and every other way; against Abbas, Hamas and all the rest – and this is what has guided his actions, and this is what provoked Hamas into going to war against Israel.
Paul Merrell

Senate committee adopts cybersecurity bill opposed by NSA critics | World news | thegua... - 0 views

  • The Senate intelligence committee voted Tuesday to adopt a major cybersecurity bill that critics fear will give the National Security Agency even wider access to American data than it already has.Observers said the bill, approved by a 12 to 3 vote in a meeting closed to the public, would face a difficult time passing the full Senate, considering both the shortened legislative calendar in an election year and the controversy surrounding surveillance.But the bill is a priority of current and former NSA directors, who warn that private companies’ vulnerability to digital sabotage and economic data exfiltration will get worse without it.Pushed by Dianne Feinstein and Saxby Chambliss, the California Democrat and Georgia Republican who lead the committee, the bill would remove legal obstacles that block firms from sharing information "in real time" about cyber-attacks and prevention or mitigation measures with one another and with the US government.
  • Worrying civil libertarians is that the NSA and its twin military command, US Cyber Command, would receive access to vast amounts of data, and privacy guidelines for the handling of that data are yet to be developed.A draft of the bill released in mid-June would permit government agencies to share, retain and use the information for "a cybersecurity purpose" – defined as "the purpose of protecting an information system or information that is stored on, processed by or transiting an information system from a cybersecurity threat or security vulnerability" – raising the prospect of the NSA stockpiling a catalogue of weaknesses in digital security, as a recent White House data-assurance policy permits.It would also prevent participating companies from being sued for sharing data with each other and the government, even though many companies offer contract terms of service prohibiting the sharing of client or customer information without explicit consent.
  • But digital rights advocates warn that the measure will give the government, including the NSA, access to more information than just that relating to cyberthreats, potentially creating a new avenue for broad governmental access to US data even as Congress and the Obama administration contemplate restricting the NSA's domestic collection.The bill contains "catch-all provisions that would allow for the inclusion of a lot more than malicious code. It could include the content of communications. That's one of the biggest concerns," said Gabriel Rottman, an attorney with the American Civil Liberties Union.Provisions in the bill are intended to protect American privacy on the front end by having participating companies strike "indicators … known to be personal information of or identifying a United States person" before the government sees it, but the draft version leaves specific guidelines for privacy protection up to the attorney general."Nobody knows whether the flow from the private sector will be a trickle or a river or an ocean. The bill contemplates an ocean, and that's what worries us," said Greg Nojeim of the Center for Democracy and Technology.
Paul Merrell

A Zombie Bill Comes Back to Life: A Look at The Senate's Cybersecurity Information Shar... - 0 views

  • The Senate Intelligence Committee recently introduced the Cybersecurity Information Sharing Act of 2014. It’s the fourth time in four years that Congress has tried to pass "cybersecurity" legislation. Unfortunately, the newest Senate bill is one of the worst yet. Cybersecurity bills aim to facilitate information sharing between companies and the government, but they always seem to come with broad immunity clauses for companies, vague definitions, and aggressive spying powers. Given such calculated violence to users' privacy rights, it’s no surprise that these bills fail every year. What is a surprise is that the bills keep coming back from the dead. Last year, President Obama signed Executive Order 13636 (EO 13636) directing the Department of Homeland Security (DHS) to expand current information sharing programs that are far more privacy protective than anything seen in recent cybersecurity bills. Despite this, members of Congress like Rep. Mike Rogers and Senator Dianne Feinstein keep on introducing bills that would destroy these privacy protections and grant new spying powers to companies.
  • Aside from its redundancy, the Senate's bill grants two new authorities to companies. First, the bill authorizes companies to launch countermeasures for a "cybersecurity purpose" against a "cybersecurity threat." "Cybersecurity purpose" is so broadly defined that it means almost anything related to protecting (including physically protecting) an information system, which can be a computer or software. The same goes for a "cybersecurity threat," which includes anything that "may result" in an unauthorized effort to impact the availability of the information system. Combined, the two definitions could be read by companies to permit attacks on machines that unwittingly contribute to network congestion. The countermeasures clause will increasingly militarize the Internet—a prospect that may appeal to some "active defense" (aka offensive) cybersecurity companies, but does not favor the everyday user. Second, the bill adds a new authority for companies to monitor information systems to protect an entity's rights or property. Here again, the broad definitions could be used in conjunction with the monitoring clause to spy on users engaged in potentially innocuous activity. Once collected, companies can then share the information, which is also called “cyber threat indicators,” freely with government agencies like the NSA.
  • Such sharing will occur because under this bill, DHS would no longer be the lead agency making decisions about the cybersecurity information received, retained, or shared to companies or within the government. Its new role in the bill mandates DHS send information to agencies like the NSA—"in real-time and simultaneous[ly]." DHS is even barred from "delay[ing]" or "interfer[ing]" with the information, which ensures that DHS's current privacy protections won’t be applied to the information. The provision is ripe for improper and over-expansive information sharing. This leads to a question: What stops your sensitive personal information from being shared by companies to the government? Almost nothing. Companies must only remove personally identifiable information if the information is known to be US person information and not directly related to the threat. Such a willful blindness approach is inappropriate. Further, the bill does not even impose this weak minimization requirement on information shared by, and within, the government (including federal, state, local, and tribal governments) thereby allowing the government to share information containing personally identifiable information. The bill should require deletion of all information not directly related to a threat.
  • ...2 more annotations...
  • Once the information is sent to a government agency, it can use the information for reasons other than for cybersecurity purposes. One clause even allows the information to be used to prosecute violations of the Espionage Act—a World War I era law that was meant to prosecute spies but has been used in recent years primarily to go after journalists’ sources. The provisions grant the government far too much leeway in how to use the information for non-cybersecurity purposes. The public won’t even know what information is being collected, shared, or used because the bill will exempt all of it from disclosure under the Freedom of Information Act.
  • The bill also retains near-blanket immunity for companies to monitor information systems, to share information, and to use countermeasures. The high bar immunizes an incredible amount of activity, including negligent damage to property and may deprive private entities of legal recourse if a computer security contractor is at fault for destruction of property. Existing private rights of action for violations of the Wiretap Act, Stored Communications Act, and the Computer Fraud and Abuse Act would be precluded or at least sharply restricted by the clause. It remains to be seen why such immunity is needed when just a few months ago, the FTC and DOJ noted they would not prosecute companies for sharing such information. It's also unclear because we continue to see companies freely share information among each other and with the government both publicly via published reports and privately.
Paul Merrell

Ukraine, Georgia and Moldova to obtain non-NATO ally status, increase in transfer of mi... - 0 views

  • The U.S. Congress passed in two readings a Russian aggression prevention bill that provides major non-NATO ally status for Ukraine, Georgia, and Moldova (during the period in which each of such countries meets specified criteria) for purposes of the transfer or possible transfer of defense articles or defense services. The bill was submitted to the competent commission for being prepared for the final reading, APA reports, quoting the official website of the U.S. Congress. The bill directs President Barack Obama to increase U.S. Armed Forces interactions with the armed forces of Ukraine, Georgia, Moldova, Azerbaijan, Bosnia and Herzegovina, Kosovo, Macedonia, Montenegro, and Serbia; and U.S and NATO security assistance to such states. Armenia is not included in the list. The bill also amends the Natural Gas Act to apply the expedited application and approval process for natural gas exports to World Trade Organization members, and urges the U.S. Agency for International Development (USAID), the Trade and Development Agency, the Overseas Private Investment Corporation (OPIC), the World Bank Group, and the European Bank for Reconstruction to promote assistance to Ukraine, Georgia, and Moldova in order to exploit natural gas and oil reserves and to develop alternative energy sources.
  • The document prohibits any federal department or agency from taking any action that recognizes Russian Federation sovereignty over Crimea or otherwise endorses the Russian Federation’s illegal annexation of Crimea, and directs the Secretary of State to strengthen democratic institutions, the independent media, and political and civil society organizations in countries of the former Soviet Union; and increase educational and cultural exchanges with countries of the former Soviet Union.
Paul Merrell

ISIL, Turkey: The Dream of Restoring the Glories of Sublime Ottoman State , by Israa Al... - 0 views

  • The ISIL’s funding father is Erdogan’s personal friend The name of the Saudi businessman Yassin al-Qadi has been linked to organizations classified as terrorist internationally. In particular, the foreign press and the Turkish opposition media describe him as “al-Qaeda’s funding father”. After the events of September 11/2001, al-Qadi- along with other figures- has been included in the world’s list of terrorists, and his name was stereotyped as a terrorist man. This made several countries ban him from entering into their territories, Turkey was one of them. Earlier, the Turkish media documented a photo scandal: Erdogan’s meetings with Yassin al-Qadi as well as long meetings with his son Bilal Recep Tayyip Erdogan. The scandal that was leaked by Turkish security elements came in the context of the case of corruption of which the son of the former Turkish Prime Minister has been accused. Based upon this, a large number of elements of the security corps were arrested being accused of plotting a coup against the government.
  • Nevertheless, the French journalist Thierry Meyssan describes Yassin al-Qadi as a personal friend of both Dick Cheney (former U.S. Vice President) and Recep Tayyip Erdogan. According to him, al-Qadi visited Turkey four times during 2012, and “his plane used to land at the second airport of Istanbul, and was being welcomed by the Prime Minister personally, without going through the smart gate, and after cutting the security cameras’ power supply”. The Turkish Gmehoriet Newspaper intended to publish details about the investigations conducted by the Turkish judiciary on the same case, and mentioned that Recep Tayyip Erdogan introduced Yassine al-Qadi as a Saudi businessman visiting Turkey to invest and denied that he is a terrorist. It quoted him as saying: “I trust Mr. Al-Qadi just as I trust myself. He is an almsgiver”.
  • The Turkish newspaper, after publishing Erdogan’s utterances before the Turkish judiciary, revealed that the Turkish police monitored 12 visits made by the Saudi man to Turkey. Seven out of these visits have been made with the help of Erdogan, the period when he was banned from entering Turkey, because his name was added as one of the world wanted terrorists in the list of the American FBI. The newspaper commented saying: “When the Turkish police was looking for al-Qadi, he was holding meetings with the Prime Minister”. Also, it published a photograph that showed separately the aforesaid man, Erdogan, and the Turkish intelligence chief Hakan Fidan, when they were going to a meeting that gathered them. The newspaper noted that Fidan himself met with al-Qadi 5 times when Al-Qadi has been banned from entering the Turkish territory.
  • ...7 more annotations...
  • Yet, the interesting thing is the leaked recordings published by the newspaper that disclose that Yassin al-Qadi used to give orders to the Erdogan’s office. He used to call to inform them that he had decided today to meet with Erdogan, and that the latter should not engage in any other obligations. The newspaper reported details about the dates of the meetings between the two men, what implies that the meetings were being attended by Fidan and by the Egyptian businessman Osama Qutob; the son of Muhammad Qutob the brother of the Brotherhood leader Sayyid Qutob who holds the Turkish citizenship and is living with his father in Turkey at present. This also mean that the meetings were taking place sometimes at the home of the Turkish businessman Mustafa Latif Topas in Istanbul, attended by Erdogan’s son and Moaz the son of al-Qadi. The recordings verify that Qutob was in charge of delivering the messages from the insurgents in the battlefield in Syria to Erdogan, what signifies that the meetings of these figures exceeded the issues of investment, and perhaps they exploited the title of a charity practice!
  • Those returning from Turkey refer to the public sympathy in the pro-government Turkish street with the ISIL. Social networking websites publish photos of Islamic libraries in Istanbul selling “T-shirts” and goods with the ISIL logo on them. Perhaps this news is no longer shocking after what the German (ARD) Television has revealed regarding the opening of an office for the ISIL in al-Fateh Street in Istanbul, being ran by Turks. Through it, the process of supporting and supplying the Takfiri organization in Iraq and Syria with funds and fighters takes place.
  • The German channel itself revealed in a video report aired by it that the ISIL has training camps on the Turkish territory: 1- The GAZIANTEP Camp: a training camp for the ISIL fighters According to the report published by the website of “Today’s Zaman”, an English-language newspaper in Turkey, the Governor of the Gaziantep (Erdal Ata) rushed to hold a press conference to deny what has been revealed by the German television. However, he spoke about the arrest of 19 elements that belong to the ISIL in the city, among those who came from European countries before committing them to trial.
  • Additionally, the Lebanese journalist Hassan Hamade, in an earlier interview with Al-Manar, drew attention to the existence of three training camps in Turkey for the fighters of extremist organizations [3]. 2- The ORFA Camp, southeastern Turkey: a camp out of which the gunmen came when they attacked the Kasab city that its residents are predominantly Armenian.
  • 3- The OSMANIYA camp in Adana, southern Turkey: It is directly near the major bases of the U.S. Air Force in the Turkish territory. Yet, what is interesting is that the Osmaniya camp is a stone’s throw away from the gas pipelines points of intersection coming from Iraq and Central Asia that empty the freight in the Turkish port of Ceyhan on the Mediterranean Sea. 4- The KARMAN camp, it is also in Adana but is much closer to Istanbul. Moreover, a document published by the French journalist Thierry Meyssan, earlier, revealed that Turkey facilitated the infiltration of 5,000 fighters, who belong to al-Qaeda, to the Syrian territory after receiving training in Libya.
  • Perhaps the report of the American TV Network clarifies the argument of the Turkish journalist Orhan Kama Genghis: “The strongholds of the ISIL are located close to the Turkish border, and this did not happen coincidentally”. The Turkish journalist Kadri Gursel talks about the fact that the Turkish border territories have turned into an easy pathway facilitating the arrival and departure of the militants, where there are no formal procedures (visas, etc…) that could bother them, referring to the cooperation of the Turkish intelligence agency with the militants. Above and beyond, the Turkish opposition Republican People’s Party MP Muharram Ingee said that the ISIL leader “Mazen Abu Mohammed” received treatment in one of the Turkish government hospitals in the city of Hatay on April 2014, publishing a photo of the terrorist man in the hospital.
  • Reviewing these data provide an early answer to the question of the Saudi writer, Nawaf Qadimi, who is known for his support for the Muslim Brotherhood, where the phenomenon of the ISIL leads us to evoke history. The Seljuks drew the policies to expand their influence and their tools were the advocates of takfir and the recruiting of fighters in the name of religion. Here is Erdogan in actual fact walking in the footsteps of the ancestors and painting policies, and the tools are the texts of takfir for which he is recruiting fighters in the name of religion itself! That is how history is enabling us to understand our present...
Paul Merrell

'A Line in the Sand' in Fight to Release Thousands of Photos of Prisoner Abuse - The In... - 0 views

  • A federal judge is demanding that the government explain, photo-by-photo, why it can’t release hundreds, and perhaps thousands, of pictures showing detainee abuse by U.S. forces at military prison sites in Iraq and Afghanistan. In a courtroom in the Southern District of New York yesterday, Judge Alvin Hellerstein appeared skeptical of the government’s argument, which asserted that the threat of the Islamic State and Al Qaeda exploiting the images for propaganda should override the public’s right to see any of the photos. He was “highly suspicious” of the government’s attempt to declare the whole lot of the photos dangerous. “It’s too easy and too meaningless,” he said. Since 2004, the American Civil Liberties Union has been fighting for the release of photos from military investigations into prisoner abuse beyond those that were leaked from Abu Ghraib. The additional pictures reportedly show sexual assault, soldiers posing with dead bodies, and other offenses. The exact number of photos has not been disclosed in court, though former Senator Joe Lieberman has previously said that there are nearly 2,100.
  • Hellerstein first ordered the government to hand over a subset of the pictures in 2005. President Obama decided to release them in 2009, but Iraqi Prime Minister Nouri al-Maliki and the top American general in Iraq implored him not to. Congress then passed a law amending the Freedom of Information Act to allow the Secretary of Defense to certify that publishing the pictures could put American lives at risk, which then-secretary Robert Gates did. The ACLU continued to fight the issue in court, and last August, Hellerstein ordered that the government needed to justify withholding each picture individually.
Gary Edwards

Swimming with the Sharks: Goldman Sachs, School Districts, and Capital Appreciation Bon... - 0 views

  • In 2008, after collecting millions of dollars in fees to help California sell its bonds, Goldman urged its bigger clients to place investment bets against those bonds, in order to profit from a financial crisis that was sparked in the first place by irresponsible Wall Street speculation. Alarmed California officials warned that these short sales would jeopardize the state’s bond rating and drive up interest rates. But that result also served Goldman, which had sold credit default swaps on the bonds, since the price of the swaps rose along with the risk of default.
  • In 2009, the lenders’ lobbying group than proposed and promoted AB1388, a California bill eliminating the debt ceiling requirement on long-term debt for school districts. After it passed, bankers traveled all over the state pushing something called “capital appreciation bonds” (CABs) as a tool to vault over legal debt limits. (Think Greece again.) Also called payday loans for school districts, CABs have now been issued by more than 400 California districts, some with repayment obligations of up to 20 times the principal advanced (or 2000%).
  • The controversial bonds came under increased scrutiny in August 2012, following a report that San Diego County’s Poway Unified would have to pay $982 million for a $105 million CAB it issued. Goldman Sachs made $1.6 million on a single capital appreciation deal with the San Diego Unified School District.
  • ...10 more annotations...
  • . . . AB1388, signed by then-Gov. Arnold Schwarzenegger in 2009, [gave] banks the green light to lure California school boards into issuing bonds to raise quick money to build schools. Unlike conventional bonds that have to be paid off on a regular basis, the bonds approved in AB1388 relaxed regulatory safeguards and allowed them to be paid back 25 to 40 years in the future. The problem is that from the time the bonds are issued until payment is due, interest accrues and compounds at exorbitant rates, requiring a balloon payment in the millions of dollars. . . . Wall Street exploited the school boards’ lack of business acumen and proposed the bonds as blank checks written against taxpayers’ pocketbooks. One school administrator described a Wall Street meeting to discuss the system as like “swimming with the big sharks.” Wall Street has preyed on these school boards because of the millions of dollars in commissions. Banks, financial advisers and credit rating firms have billed California public entities almost $400 million since 2007. [State Treasurer] Lockyer described this as “part of the ‘new’ Wall Street,” which “has done this kind of thing on the private investor side for years, then the housing market and now its public entities.”
  • The Federal Reserve could have made virtually-interest-free loans available to local governments, as it did for banks. But the Fed (whose twelve branches are 100% owned by private banks) declined. As noted by Cate Long on Reuters:
  • The Fed has said that it will not buy muni bonds or lend directly to states or municipal issuers. But be sure if yields rise high enough Merrill Lynch, Goldman Sachs and JP Morgan will be standing ready to “save” these issuers. There is no “lender of last resort” for muniland.
  • Among the hundreds of California school districts signing up for CABs were fifteen in Orange County. The Anaheim-based Savanna School District took on the costliest of these bonds, issuing $239,721 in CABs in 2009 for which it will have to repay $3.6 million by the final maturity date in 2034. That works out to $15 for every $1 borrowed. Santa Ana Unified issued $34.8 million in CABs in 2011. It will have to repay $305.5 million by the maturity date in 2047, or $9.76 for every dollar borrowed. Placentia-Yorba Linda Unified issued $22.1 million in capital appreciation bonds in 2011. It will have to repay $281 million by the maturity date in 2049, or $12.73 for every dollar borrowed.
  • In 2013, California finally passed a law limiting debt service on CABs to four times principal, and limiting their maturity to a maximum of 25 years. But the bill is not retroactive. In several decades, the 400 cities that have been drawn into these shark-infested waters could be facing municipal bankruptcy – for capital “improvements” that will by then be obsolete and need to be replaced.
  • Then-State Treasurer Bill Lockyer called the bonds “debt for the next generation.” But some economists argue that it is a transfer of wealth, not between generations, but between classes – from the poor to the rich. Capital investments were once funded with property taxes, particularly those paid by wealthy homeowners and corporations. But California’s property tax receipts were slashed by Proposition 13 and the housing crisis, forcing school costs to be borne by middle-class households and the students themselves.
  • According to Demos, per-student funding has been slashed since 2008 in every state but one – the indomitable North Dakota. What is so different about that state? Some commentators credit the oil boom, but other states with oil have not fared so well. And the boom did not actually hit in North Dakota until 2010. The budget of every state but North Dakota had already slipped into the red by the spring of 2009.
  • One thing that does single the state out is that North Dakota alone has its own depository bank.
  • The state-owned Bank of North Dakota (BND) was making 1% loans to school districts even in December 2014, when global oil prices had dropped by half. That month, the BND granted a $10 million construction loan to McKenzie County Public School No. 1, at an interest rate of 1% payable over 20 years. Over the life of the loan, that works out to $.20 in simple interest or $.22 in compound interest for every $1 borrowed. Compare that to the $15 owed for every dollar borrowed by Anaheim’s Savanna School District or the $10 owed for every dollar borrowed by Santa Ana Unified.
  • How can the BND afford to make these very low interest loans and still turn a profit? The answer is that its costs are very low. It has no exorbitantly-paid executives; pays no bonuses, fees, or commissions; pays no dividends to private shareholders; and has low borrowing costs. It does not need to advertise for depositors (it has a captive deposit base in the state itself) or for borrowers (it is a wholesale bank that partners with local banks, which find the borrowers). The BND also has no losses from derivative trades gone wrong. It engages in old-fashioned conservative banking and does not speculate in derivatives. Unlike the vampire squids of Wall Street, it is not motivated to maximize its bottom line in a predatory way. Its mandate is simply to serve the public interest.
  •  
    " Remember when Goldman Sachs - dubbed by Matt Taibbi the Vampire Squid - sold derivatives to Greece so the government could conceal its debt, then bet against that debt, driving it up? It seems that the ubiquitous investment bank has also put the squeeze on California and its school districts. Not that Goldman was alone in this; but the unscrupulous practices of the bank once called the undisputed king of the municipal bond business epitomize the culture of greed that has ensnared students and future generations in unrepayable debt."
Paul Merrell

Great Britain Creates a Cyber Brigade to Manipulate Public Opinion | New Eastern Outlook - 0 views

  • t’s no coincidence then that the White House advised London to establish a special unit within its military structure – the British Cyber Command, transferring up to 1500 officers under its command just “for starters”. One must note that Washington has already created its own special unit for cyberwarfare back in 2009. This unit goes under the name of United States Cyber Command, with its headquarters being located at Fort Meade (Maryland). According to The Guardian, the 77th brigade will formally come into being in April. The brigade will be carrying out covert operations on social networks exclusively, in an effort to spread disinformation and manipulate the population of certain countries, which should create “favorable conditions” for applying political pressure or the executing of regime change in strategically important regions of the world. Its headquarters will be located to the west of London in Newbury (Berkshire) while it’s official insignia will be the famous symbol of Chindits (a mythical god-like lion guarding temples in Myanmar and other countries in South-East Asia), that was used by a a British India ‘Special Force’ which participated in the suppression of guerrilla Japanese troops deep in the forests of Southeast Asia. The use of social networks to overthrow unwanted regimes has been Washington’s modus operandi for decades now. This led to the creation of a whole industry of disinformation and the manipulation of public opinion. The events surrounding the Arab Spring, countless other color revolutions and the latest events in Ukraine can serve as a perfect example of how an unstable sociopolitical and economic situation in a country can be exploited by Western intelligence agencies to a achieve a radical change in the sovereign governments of other states .First appeared: http://journal-neo.org/2015/02/11/rus-v-britanii-sozdayut-internetarmiyu/
  •  
    In Egypt, Tunisia, Yemen, Algeria, Jordan, Syria, Ukraine, and Hong Kong along with a number of other countries, social networks have been used to coordinate the movement of protest groups, which allowed the gathering of a considerable number of protesters in designated areas. Back in 2011 the The Guardian reported the US Department of Defense was developing special software designed solely for manipulating social network users into buying pro-American propaganda. This operation was codenamed Operation Earnest Voice. This software has been put to "good use" in Britain, the United States and other Western countries during the Ukraine crisis for mass distribution of misleading information about Russia. This operation went as far as attempting to rewrite the history of World War II, with the active participation of Polish and Baltic politicians. The news on the creation of the 77th Brigade came short after the announcement made by Lieutenant General Marshall Webb the Commander, NATO Special Operations Forces HQ on the need to improve counter-information efforts against the Islamic State, as well as Russian and alternative media's coverage of the true causes of the ongoing events in Ukraine, and the large scale extermination of the civilian population by Kiev military units. These concerns, along with the recent events in Afghanistan, Iraq, and Syria, were the reason behind the assembly of a British cyber squad.
Paul Merrell

As U.S. attacks Islamic State, Syria steps up assaults on moderate rebels - The Washing... - 0 views

  • Syrian government forces have dramatically intensified air and ground assaults on areas held by moderate rebels, attempting to deliver crippling blows as world attention shifts to airstrikes by a U.S.-led coalition against Islamic State militants in Iraq and Syria.
  • Rebels in Aleppo say President Bashar al-Assad’s military has escalated attacks in northern areas of the city, trying to cut the supply lines of opposition fighters inside Aleppo. “During the last three days, we have been hit by over 120 barrel bombs,” said Ahmed Abu Talal, a rebel belonging to the Islamic Front group, referring to particularly deadly high-explosive bombs that are often dropped by helicopter. Syria’s military has virtually encircled the city with the help of Shiite militias from Lebanon and Iran, the Assad regime’s chief ally.
  • Rebels and analysts say Assad’s forces are increasing their attacks to exploit what the regime sees as a window of opportunity opened by a campaign that Washington and its allies launched last month against the Islamic State, a heavily armed al-Qaeda offshoot that is also known as ISIS or ISIL.
  • ...3 more annotations...
  • Abu Talal said pro-government forces are trying to take the village of Handarat, which is located just north of Aleppo and next to one of the last roads connecting the city’s rebels with reinforcements and food brought in from the Turkish border. The fall of that road would constitute a major blow to Assad’s opposition in a three-year-old civil war that has killed nearly 200,000 people.
  • The regime has stepped up aerial bombardment of the rebel-held suburbs of eastern Damascus, as well as in areas near the city of Idlib. Government helicopters have dropped some 45 barrel bombs in recent days in the countryside near Idlib to halt rebel movements near two military bases on a strategic road connecting Aleppo with Hama, to the south, said Abdullah Jabaan, a resident of Idlib and journalist for the Syria Live News Network, which supports the opposition.
  • Meanwhile, Assad’s military has largely avoided territory held by Islamic State militants, instead striking moderate rebel factions that could be slated to receive weapons and military training from the coalition, said Riad Kahwaji, chief executive of the Dubai-based Institute for Near East and Gulf Military Analysis. “If the regime manages to fully besiege Aleppo at this time, they would block and undermine the plans of the alliance to use the opposition, or at least present the opposition, as the ultimate ground force to deal with ISIS,” he said. A successful routing of those rebels could position the Assad regime as the only force in Syria capable of fighting the Islamic State, he said.
  •  
    I take this article more as an indication of what the current line of pro-war propaganda is in the U.S. than an indication of what is really happening in Syria. Bear in mind that there is no moderate opposition to the Syrian government and all sources for this article are opposition spokesmen and the "Syrian Observatory for Human Rights" in the UK, a one-man show that functions as a U.S. government propaganda mouthpiece.     
Paul Merrell

Land Destroyer: Entire "Occupy Central" Protest Scripted in Washington - 0 views

  • The slogans, leaders, and agenda of the "Occupy Central" movement are supposedly the manifestations of Hong Kong's desire for "total democracy," "universal suffrage," and "freedom." In reality, the leaders of "Occupy Central" are verified to be directly backed, funded, and directed by the US State Department, its National Endowment for Democracy (NED), and its subsidiary, the National Democratic Institute (NDI). Despite admitting this overwhelming evidence, many "Occupy Central" supporters still insist the protests are genuine and now some propose that the "Occupy Central" leadership does not truly represent the people of Hong Kong. While the leadership of "Occupy Central" indeed in no way represent the people of Hong Kong, the fact still remains that the protest itself was prearranged at least as early as April 2014, revealed by "Occupy Central" co-organizers Martin Lee and Anson Chan before NED in Washington DC.
  • The talk titled, "Why Democracy in Hong Kong Matters," spanned an hour, with NED regional vice president Louisa Greve leading the duo through a full introduction of the "Occupy Central" movement, its characters, agenda, demands, and talking points. Anson Chan - Hong Kong’s Chief Secretary under British rule - in particular, with her perfect British accent, insisted repeatedly that the issue was China's apparent backtracking on "deals" made with the UK over the handover of Hong Kong in the late 1990's. Lee, as well as members of the audience, repeatedly stated that Hong Kong's role was to "infect" mainland China with its Western-style institutions, laws, and interests. Lee also repeatedly appealed to Washington specifically to ensure they remained committed to defending American interests in Hong Kong. Both Lee and Chan would also state that since China appears to be concerned over global perception of how it rules its people, this could be exploited to excise from Beijing concessions over Hong Kong's governance. This included mention of previous protests, including those led by "activist" Joshua Wong and his suspicious "Scholarism" organization that has been tracked since at least 2012 by the US State Department's NDI. And of course, future destabilization was submitted as a viable solution to bending Beijing toward Western concessions.
  • For those able to listen to the entire 1 hour interview as well as questions and answers, the entire "Occupy Central" narrative is laid bare, verbatim, in Washington DC months before demonstrations began in the streets of Hong Kong. For a supposed "pro-democracy" protest seeking self-governance and self-determination and denouncing "interference" from Beijing, that their leaders are funded by foreign interests, and the plans for "Occupy Central" laid in a foreign capital is ironic at best - utter and very intentional deceit at worst. Democracy indeed assumes self-governance and self determination. If the US State Department is colluding with, funding, and directing the politicians and protest leaders behind "Occupy Central," the people of Hong Kong are governing and determining nothing - Washington and Wall Street are. Martin Lee and collaborator Anson Chan complain about Beijing dictating policy in Hong Kong, while they sit together in a room full of foreign interests who would dictate Hong Kong's governance instead.  Laid bare is "Occupy Central's" true agenda. It is not about having Hong Kong vote for who they desire to see in power, it is about getting the foreign-backed political cabal behind "Occupy Central" into power, and disarming Beijing of any means to prevent what is for all intents and purposes the "soft" recolonization of Hong Kong, and a further attempt to divide and destabilize China as a whole.
Paul Merrell

Cynics, Step Aside: There is Genuine Excitement Over a Hillary Clinton Candidacy - The ... - 0 views

  • It’s easy to strike a pose of cynicism when contemplating Hillary Clinton’s inevitable (and terribly imminent) presidential campaign. As a drearily soulless, principle-free, power-hungry veteran of DC’s game of thrones, she’s about as banal of an American politician as it gets. One of the few unique aspects to her, perhaps the only one, is how the genuinely inspiring gender milestone of her election will (following the Obama model) be exploited to obscure her primary role as guardian of the status quo. That she’s the beneficiary of dynastic succession – who may very well be pitted against the next heir in line from the regal Bush dynasty (this one, not yet this one) - makes it all the more tempting to regard #HillaryTime with an evenly distributed mix of boredom and contempt. The tens of millions of dollars the Clintons have jointly “earned” off their political celebrity - much of it speaking to the very globalists, industry groups, hedge funds, and other Wall Street appendages who would have among the largest stake in her presidency - make the spectacle that much more depressing (the likely candidate is pictured above with Goldman Sachs CEO Lloyd Blankfein at an event in September).
  • But one shouldn’t be so jaded. There is genuine and intense excitement over the prospect of (another) Clinton presidency. Many significant American factions regard her elevation to the Oval Office as an opportunity for rejuvenation, as a stirring symbol of hope and change, as the vehicle for vital policy advances. Those increasingly inspired factions include: Wall Street Politico Magazine, November 11, 2014 (“Why Wall Street Loves Hillary”):
  • The Israel Lobby Foreign Policy, Aaron David Miller, November 7, 2014 (“Would Hillary Be Good For the Holy Land?”):
  • ...2 more annotations...
  • Interventionists (i.e., war zealots) New York Times, June 15, 2014 (“Events in Iraq Open Door for Interventionist Revival, Historian Says”):
  • Old school neocons New York Times, Jacob Heilbrunn, July 5, 2014 (“The Next Act for Neocons: … Getting Ready to Ally With Hillary Clinton”?):
  •  
    Glenn Greenwald serves some satire about Hillary Clinton's 2016 candidacy.
Gary Edwards

The Daily Bell - America's Coming Crackup - 0 views

  • Our government bankers print money today like loons in an asylum spew absurdity. Glib media shills lure us every night into a disgraceful indolence. And our corporations lust like spoiled children after mega-billions of illicit lucre. Cataclysm is coming. No one with a minimal awareness of history, politics and proper economics today has faith that our society can continue much longer at its present level of government privilege and debt accumulation. There is a Grand Piper that must be paid, and he will manifest in any number of scenarios, none of which will be pleasant. One thing is for sure: The next two decades are going to be tumultuous and tragic. The events that unfold will be far more radical than we dare envision today. Paradigms in banking, politics and philosophy will be overturned. Wrenching lifestyle shifts will be forced upon millions. Something akin to what happened in the Soviet Union after the fall of communism in 1991 will take place in America. Our ruling regime will collapse and bring Russian-style economic hardship to us all. How exactly things unfold will depend upon whether the nation's intelligentsia bring themselves to seriously question the shams of statism, or whether the government-media-academy triad is able to continue bamboozling them. What is extremely unnerving is that whoever wins this battle to control the destiny of our country will determine the fate of freedom on the planet for hundreds, perhaps thousands of years. A monumental clash of ideology and propriety looms up ahead.
  • Why We Are Disintegrating as a Society
  • America's dilemma is this: We are being propelled toward an Orwellian style despotism that's purpose is to centralize government power in Washington, phase out American sovereignty and move our country as much as possible into subordination to the United Nations and eventually alignment with Canada, Mexico and Central America into a regional government. The world is moving toward the nightmare of Oceana, Eurasia and East Asia in Orwell's Nineteen Eighty-Four, which will extinguish freedom and merge mankind into a tyrannical egalitarianism. Why is this happening? Such is the influential force of ideology. We are being destroyed because of what historian Clarence Carson called a "collectivist curvature of the mind" that took over our intellectuals back in the early twentieth century. This curvature of the mind functions as the grand fueling mechanism for the goals of government centralization and ending our national sovereignty. It's horrifying, but every year our schools form the "best and the brightest minds" into collectivist apparatchiks to go out in the world and work their way into the power centers of society. The schools do this via false teachings in philosophy, economics, political science and history. This "ideological indoctrination" teaches every new generation that capitalism is an evil, exploitative, racist, warmongering system and must be phased out of modern societies. It teaches that national sovereignty is anachronistic and must be given up. Such indoctrination is being done very subtly and sophisticatedly, but it is a powerful, pervasive theme instilled into all our children from the first grade on.
  • ...15 more annotations...
  • This is why we have so many bankers, corporate moguls, political statesmen, authors, pundits, artists, publishers and priests working today to undercut the country. Being "the best and the brightest," they were taught in their youth that capitalist America is an evil nation. They, thus, have gone out and risen to positions of power with a globalist worldview that believes economic freedom can't work in the modern day, that American sovereignty is an anachronism belonging to the nineteenth century. Since they are the nation's intelligentsia, they are immensely influential. Their socialist-collectivist worldview is spread to the masses which then elect legislators sympathetic to such irrationality to Congress and the White House.
  • Every one of us has to choose whether we will try to make a difference or give in to indifference. Will we fight to inform our neighbors or succumb to the easy road of apathy? Will we opt for principle or popularity? Will we succumb to the statist thugs on the far left, or fall for the anarchic screwballs on the far right? The "mean" of constitutional sanity beckons to the percipient among us. Will it survive the tumult ahead?
  • All quite clear and horrifying. But how are we, as mere laymen with no access to national media or huge fortunes, to confront this destruction of freedom and sanity in America and throughout the West?
  • We must take a page from the story of the old man and the starfish. After a huge storm had brought a mini-tidal wave to his beach community one night, there were tens of thousands of starfish washed up on the shore that next morning. Amidst the masses of starfish the old man could be seen patiently picking them up and tossing them back into the sea. Along came a young lad in his twenties with green hair, eyebrow rings and a scornful face. He started laughing and mocked the old man with cynical derision. "You have to be crazy, old timer. You can't possibly save those starfish; there's thousands of them. You're wasting your time, you fool. YOU CAN'T MAKE A DIFFERENCE!" The old man looked up at the insolent youth and smiled. He then reached down and picked up one of the struggling starfish and winged it far out into the water, replying to his tormentor, "Made a difference with that one, didn't I?"
  • Making a Difference
  • Not everyone, naturally, has the time and mental wherewithal to forcefully fight the "ideological indoctrination" destroying our country today. But many of us do. Our power lies in our minds and the strength of our personalities. We who possess this inner strength feel compelled to spread the word in any way we can for as long as we live. We feel compelled to wing as many starfish back to life as we can. The apathetic and cynical will scorn all this as senseless, just as the green-haired youth did. They will choose to remain wards of the state and sanction their enslavers. This has always been the nature of most humans. When such wards see others fighting valiantly against seemingly insurmountable odds for the freedom they have scorned, they are subconsciously humiliated because they are not deep in the thick of the fight themselves. They have chosen to avoid the fight and sanction the tyrants who are destroying our way of life. Thus, they must find a way to salve their consciences. That way is to caustically mock the Davids who go up against the Goliaths, to smear the Rolands of Roncesvalles that history hands down to us as heroic exemplars.
  • A Diplomatic Nuisance
  • You the reader have a paramount decision to make regarding all this. It is High Noon for the cause of freedom. Will you fight with the heroic exemplars? If you choose to fight, then your first necessity is to become aware of WHAT is happening and WHY it is happening. That awareness can only be found via fervent curiosity and a commitment to the study of libertarian and conservative literature.
  • Your second duty is to emulate Paul Revere and warn all those in your sphere of influence. You do this by making a diplomatic nuisance of yourself, by pleasantly pestering your comrades to wake up to the elite's usurpations growing by leaps and bounds in our lives. You do it by convincing them that there are grander values in life than shiny new SUVs and country club memberships. There is something called the American way of life that requires personal independence.
  • Time is short. Collectivism steals over us like crack cocaine filters into a ghetto. It devastates everything of worth in its path. All the stoic traditions of strength, all the great lessons of logic, all the revered truths of Nature that have been handed down to us throughout the centuries are being assailed. The weasel-tyrants and their unctuous lackeys have gained control of the intellectual, political and banking power centers of our country, but they can't control the ultimate factor – the truth – because they can't control our minds unless we let them. They can't prohibit defiance. Solzhenitsyn showed us this. They can't extend their enslavement UNLESS WE SANCTION IT!
  • What the elites fear is a populace with the strength of William Wallace fighting King Edward at Sterling Bridge in 1297, the daring of Washington's band crossing the Delaware in the dead of winter. They fear those willing to fight for the original America. Up against such heady citizens, our collectivist tyrants will scatter like feeding jackals in face of approaching hunters. Our job is to build an army of such heady citizens. You can help by joining the cause. Read the books of freedom and sound money, and pass them on as the early Americans did with Common Sense. Bring people to the website where you are reading this essay. Bring them to AFR's website. Bring them to a state of urgency. Bring them to the truth of our Constitution and to the laws of Nature and Nature's God. Nothing other than this kind of effort will suffice. You cannot help truth and freedom by watching moronic TV shows at night. That is how the elites control you. They flood the airwaves with mindless entertainment. It's today's version of Brave New World's "soma for the masses." Today's TV is for zombies and dullards. The same applies to our movies. Next time you're in the theater, look around you at all the hoi polloi stuffing their faces with popcorn and their psyches with over-the top-violence and trashy sex.
  • Aldous Huxley was the first to point out that modern totalitarian regimes leave the "activities of sex" alone, but regiment the "activities of production." This allows those who are servile to think they are still free as they vote away their REAL freedom – their freedom to acquire and keep wealth, to associate with whom they please, to speak and worship as they please. Look around you. There are far more servile people in this human race than there are independent people. This is the reason why dictatorships dominate the history of man; the majority of humans want to be ruled. They want to relinquish their meaningful freedom; it requires too much self-assurance and grit.
  • Logic and History
  • The cause of America is the cause of REAL freedom. It won't be found with the malefic forces of statism on the left, nor with the eccentric cults of anarchism on the right. Both are living death, a fool's game for those devoid of the capacity to see the big picture, i.e., to see that the spectrum of reality is not two-poled, but three-poled with multifarious gradations and a golden mean of truth in between. The nature of human existence is complexity, wrapped up in mystery, contained in inconceivability, subsumed under the power of Truth. We will never create a free society by denying this and ignoring the results of logic and the record of history. This is what statists and anarchists do. REAL freedom is impossible without a grasp of logic and a deep knowledge of history, which teach us that the cornerstones of freedom are equal rights, strictly limited government, gold money and self-reliant people. The statists violate logic and ignore history because they are callous brutes who place power above all and simply don't care. The anarchists violate logic and ignore history because logic and history show their political system to be unworkable.
  • The truths we learn from logic and history are the disinfectants we must hurl into Washington's swamp of political leeches that are sucking all verity from our lives. When the Washington leeches have so stultified our nation that ghastly ruin prevails throughout, then is when the crackup will commence. All readers should take note. A meltdown is coming; a revolution will follow. We must make sure this revolution goes in the direction of the Founding Fathers, not in the direction of the statist left, nor in the direction of the anarchistic right. Statism and anarchism are like the AIDS virus; they will always be deadly to life. It is to Aristotle, Locke and Jefferson that we must turn. They will always be sustaining to life.
  •  
    Wow, if this article isn't a MUST READ, then nothing is. Spot on call-to-arms. "Nelson Hultberg is a freelance scholar/writer in Dallas, Texas and the Director of Americans for a Free Republic. Nelson's articles have appeared in such publications as American Conservative, Insight, Liberty, The Freeman and The Dallas Morning News, as well as on numerous Internet sites. He is the author of The Golden Mean: Libertarian Politics, Conservative Values. Email: NelsHultberg (at) aol.com."
Paul Merrell

The CIA and Signals Intelligence - 0 views

  • The CIA and Signals Intelligence Formerly Top-Secret Multi-Volume History Details Spy Agency’s Conflicts with NSA and Military over SIGINT Role Additional Declassified Documents Describe CIA Domestic and Foreign SIGINT Activity CIA Role Often Put It in Direct Competition with NSA, but Recent Cooperation Made Possible Controversial Exploits Uncovered by Edward Snowden National Security Archive Electronic Briefing Book No. 506
Paul Merrell

UK Government Admits Intelligence Services Allowed To Break Into Any System, Anywhere, ... - 0 views

  • Recently, Techdirt noted that the FBI may soon have permission to break into computers anywhere on the planet. It will come as no surprise to learn that the US's partner in crime, the UK, granted similar powers to its own intelligence services some time back. What's more unexpected is that it has now publicly said as much, as Privacy International explains: The British Government has admitted its intelligence services have the broad power to hack into personal phones, computers, and communications networks, and claims they are legally justifed to hack anyone, anywhere in the world, even if the target is not a threat to national security nor suspected of any crime. That important admission was made in what the UK government calls its "Open Response" to court cases started last year against GCHQ. Here's what it reveals, according to Privacy International:
  • Buried deep within the document, Government lawyers claim that while the intelligence services require authorisation to hack into the computer and mobile phones of "intelligence targets", GCHQ is equally permitted to break into computers anywhere in the world even if they are not connected to a crime or a threat to national security. Moreover: The intelligence services assert the right to exploit communications networks in covert manoeuvres that severely undermine the security of the entire internet. The deployment of such powers is confirmed by recent news stories detailing how GCHQ hacked into Belgacom using the malware Regin, and targeted Gemalto, the world's largest maker of SIM cards used in countries around the world.
  • What's important about this revelation is not just the information itself -- many people had assumed this was the case -- but the fact that once more, bringing court cases against the UK's GCHQ has ferreted out numerous details that were previously secret. This shows the value of the strategy, and suggests it should be used again where possible.
Paul Merrell

Two Supermarket Executives Charged With Hoarding in Venezuela | venezuelanalysis.com - 0 views

  • Two managers of the private supermarket chain Dia Dia were formally charged by the Venezuelan state prosecutor yesterday with the alleged crimes of boycott and destabilization of the economy. Manuel Andrés Morales Ordosgoitti and Tadeo Arriechi Franco were arrested at the beginning of February after state authorities uncovered ton loads of basic items in a Dia Dia warehouse in Caracas. The indictments are part of a ramped up effort on the part of the Venezuelan government to crack down on hoarding and speculation by large private retailers, which is a primary contributing factor to inflation and widespread scarcities of basic goods.
  • The Bolivarian government has regulated the prices of everyday goods for years, in order to ensure access by the majority of Venezuelans for whom they were unaffordable under previous administrations. Nonetheless, the government has accused the private sector of exploiting this policy by hoarding cheap subsidized goods, creating consumer gaps, then selling them at exorbitant prices on the black market in what President Maduro has termed an “economic war” waged to destabilize the socialist government. Last month, board members of the private firms Dia Dia and Carnica 2005 were arrested for their companies’ role in a massive hoarding operation.
  • Carnica 2005 was nationalized and integrated into the state food distribution network PDVAL. Dia Dia operates 35 supermarkets throughout Venezuela, which are largely found in low-income communities.
  • ...2 more annotations...
  • On Monday, Venezuelan Vice-President Jorge Arreaza inaugurated the first of the nation’s “people’s military commands” in Lara state, which will be charged with “generating a victory in the economic war.” Last month, President Nicolas Maduro unveiled his plan for the creation of “peoples’ military commands” throughout the nation designed to combat “economic sabotage” at the local level by ensuring the supply of basic food and hygiene products as well as medicines. “The men and women who form these commands have the responsibility of attending to the denunciations of the people and safeguarding their access to food, medicine, and all necessary products,” declared the vice-president.
  • The people’s commands will reportedly operate in coordination with social movements, communal councils and communes, and state security organs, although details remain limited as the project is gets off the ground. 
  •  
    It's a big problem in Venezuela. The government subsidizes the purchase of consumer goods so that they can be priced lower for those with low incomes. But the right-wing "capitalists" aligned with U.S. covert agencies hoard the goods, creating artificial market shortages, then sell the goods on the black market at inflated prices. The current response by the government is criiminal prosecutions coupled with nationalization of businesses that don't hear the message. I suspect that the government may be forced at some point to drop the subsidies and begin writing welfare checks to low income citizens instead. The Bolivarian government is absolutely committed to ending poverty in Venezuela. Of course this smells too much of socialism for U.S. government tastes, which has been attempting to overthrow the Bolivarian government ever since it nationalized the oil industry. 
Paul Merrell

Silicon Valley spars with Obama over 'backdoor' surveillance | TheHill - 0 views

  • Silicon Valley and a bipartisan group of lawmakers are lining up against the Obama administration, criticizing what they see as a lack of support for total online privacy.The steady rise of sophisticated privacy techniques such as encryption and anonymity software has put the government in a difficult position — trying to support the right to privacy while figuring out how to prevent people from evading law enforcement.ADVERTISEMENT“The technologies are evolving in ways that potentially make this trickier,” President Obama said during a January news conference with British Prime Minister David Cameron.The conundrum has led to a heated debate in Washington: Should law enforcement have guaranteed access to data?
  • The Obama administration — from officials with FBI and the National Security Agency (NSA) to the president himself — has come out in favor of some form of guaranteed access while still endorsing strong encryption.“If we get into a situation in which the technologies do not allow us at all to track somebody that we're confident is a terrorist,” Obama said, “that's a problem.”What shape that access takes, however, is unclear.“The dialogue that we're engaged in is designed to make sure that all of us feel confident that if there is an actual threat out there, our law enforcement and our intelligence officers can identify that threat and track that threat at the same time that our governments are not going around phishing into whatever text you might be sending on your smartphone,” Obama said. “And I think that's something that can be achieved.”Privacy hawks on Capitol Hill aren’t buying it.
  • “I don’t think much of that,” Rep. Joe Barton (R-Texas), co-founder of the Congressional Bipartisan Privacy Caucus, told The Hill. “We have a huge homeland security apparatus with almost unlimited authority to — with some sort of a reasonable suspicion — check almost any type of communication, whether it’s voice, Internet, telephonic, electronic, you name it.”“Those were positions that did not receive rave reviews here in Silicon Valley,” said Rep. Zoe Lofgren (D-Calif.), whose district includes parts of tech-heavy San Jose.Many believe the administration’s stance is inherently at odds with robust digital protection.“In order to fully implement what he's suggesting, you would need one of two things,” Lofgren said.One would be installing so-called “backdoors” in encryption — an access point known only to law enforcement agencies. Security experts find this concept abhorrent, since cyber crooks or foreign intelligence agencies would likely exploit it.
  • ...1 more annotation...
  • The second would be to have a third-party company hold all user data, with some sort of agreement to disclose information to the government, Lofgren said.“I think actually the trend line is in a different direction, which is encryption that is not accessible to the companies that provide it, either,” she added.  Major tech companies like Apple have done exactly that, claiming that even they can’t unlock data on newer devices.
Paul Merrell

Tech firms and privacy groups press for curbs on NSA surveillance powers - The Washingt... - 0 views

  • The nation’s top technology firms and a coalition of privacy groups are urging Congress to place curbs on government surveillance in the face of a fast-approaching deadline for legislative action. A set of key Patriot Act surveillance authorities expire June 1, but the effective date is May 21 — the last day before Congress breaks for a Memorial Day recess. In a letter to be sent Wednesday to the Obama administration and senior lawmakers, the coalition vowed to oppose any legislation that, among other things, does not ban the “bulk collection” of Americans’ phone records and other data.
  • We know that there are some in Congress who think that they can get away with reauthorizing the expiring provisions of the Patriot Act without any reforms at all,” said Kevin Bankston, policy director of New America Foundation’s Open Technology Institute, a privacy group that organized the effort. “This letter draws a line in the sand that makes clear that the privacy community and the Internet industry do not intend to let that happen without a fight.” At issue is the bulk collection of Americans’ data by intelligence agencies such as the National Security Agency. The NSA’s daily gathering of millions of records logging phone call times, lengths and other “metadata” stirred controversy when it was revealed in June 2013 by former NSA contractor Edward Snowden. The records are placed in a database that can, with a judge’s permission, be searched for links to foreign terrorists.They do not include the content of conversations.
  • That program, placed under federal surveillance court oversight in 2006, was authorized by the court in secret under Section 215 of the Patriot Act — one of the expiring provisions. The public outcry that ensued after the program was disclosed forced President Obama in January 2014 to call for an end to the NSA’s storage of the data. He also appealed to Congress to find a way to preserve the agency’s access to the data for counterterrorism information.
  • ...3 more annotations...
  • Despite growing opposition in some quarters to ending the NSA’s program, a “clean” authorization — one that would enable its continuation without any changes — is unlikely, lawmakers from both parties say. Sen. Ron Wyden (D-Ore.), a leading opponent of the NSA’s program in its current format, said he would be “surprised if there are 60 votes” in the Senate for that. In the House, where there is bipartisan support for reining in surveillance, it’s a longer shot still. “It’s a toxic vote back in your district to reauthorize the Patriot Act, if you don’t get some reforms” with it, said Rep. Thomas Massie (R-Ky.). The House last fall passed the USA Freedom Act, which would have ended the NSA program, but the Senate failed to advance its own version.The House and Senate judiciary committees are working to come up with new bipartisan legislation to be introduced soon.
  • The tech firms and privacy groups’ demands are a baseline, they say. Besides ending bulk collection, they want companies to have the right to be more transparent in reporting on national security requests and greater declassification of opinions by the Foreign Intelligence Surveillance Court.
  • Some legal experts have pointed to a little-noticed clause in the Patriot Act that would appear to allow bulk collection to continue even if the authority is not renewed. Administration officials have conceded privately that a legal case probably could be made for that, but politically it would be a tough sell. On Tuesday, a White House spokesman indicated the administration would not seek to exploit that clause. “If Section 215 sunsets, we will not continue the bulk telephony metadata program,” National Security Council spokesman Edward Price said in a statement first reported by Reuters. Price added that allowing Section 215 to expire would result in the loss of a “critical national security tool” used in investigations that do not involve the bulk collection of data. “That is why we have underscored the imperative of Congressional action in the coming weeks, and we welcome the opportunity to work with lawmakers on such legislation,” he said.
  •  
    I omitted some stuff about opposition to sunsetting the provisions. They  seem to forget, as does Obama, that the proponents of the FISA Court's expansive reading of section 215 have not yet come up with a single instance where 215-derived data caught a single terrorist or prevented a single act of terrorism. Which means that if that data is of some use, it ain't in fighting terrorism, the purpose of the section.  Patriot Act § 215 is codified as 50 USCS § 1861, https://www.law.cornell.edu/uscode/text/50/1861 That section authorizes the FBI to obtain an iorder from the FISA Court "requiring the production of *any tangible things* (including books, records, papers, documents, and other items)."  Specific examples (a non-exclusive list) include: the production of library circulation records, library patron lists, book sales records, book customer lists, firearms sales records, tax return records, educational records, or medical records containing information that would identify a person." The Court can order that the recipient of the order tell no one of its receipt of the order or its response to it.   In other words, this is about way more than your telephone metadata. Do you trust the NSA with your medical records? 
Paul Merrell

What's the big deal between Russia and the Saudis? - RT Op-Edge - 0 views

  • Amidst the wilderness of mirrors surrounding the Syrian tragedy, a diamond-shaped fact persists: Despite so many degrees of separation, the Saudis are still talking to the Russians. Why? A key reason is because a perennially paranoid House of Saud feels betrayed by their American protectors who, under the Obama administration, seem to have given up on isolating Iran.
  • From the House of Saud’s point of view, three factors are paramount. 1) A general sense of ‘red alert’ as they have been deprived from an exclusive relationship with Washington, thus becoming incapable of shaping US foreign policy in the Middle East; 2) They have been mightily impressed by Moscow’s swift counter-terrorism operation in Syria; 3) They fear like the plague the current Russia-Iran alliance if they have no means of influencing it.
  • That explains why King Salman’s advisers have pressed the point that the House of Saud has a much better chance of checking Iran on all matters - from “Syraq” to Yemen - if it forges a closer relationship with Moscow. In fact, King Salman may be visiting Putin before the end of the year.
  • ...6 more annotations...
  • One of the untold stories of the recent Syria-driven diplomatic flurry is how Moscow has been silently working on mollifying both Saudi Arabia and Turkey behind the scenes. That was already the case when the foreign ministers of US, Russia, Turkey and Saudi Arabia met before Vienna.Vienna was crucial not only because Iran was on the table for the first time but also because of the presence of Egypt – incidentally, fresh from recent discovery of new oil reserves, and engaging in a reinforced relationship with Russia.The absolute key point was this paragraph included in Vienna’s final declaration: “This political process will be Syrian-led and Syrian-owned, and the Syrian people will decide the future of Syria.”It’s not by accident that only Russian and Iranian media chose to give the paragraph the appropriate relevance. Because this meant the actual death of the regime change obsession, much to the distress of US neocons, Erdogan and the House of Saud.
  • The main point is the death of the regime change option, brought about by Moscow. And that leaves Putin free to further project his extremely elaborate strategy. He called Erdogan on Wednesday to congratulate him on his and the AKP’s election landslide. This means that now Moscow clearly has someone to talk to in Ankara. Not only about Syria. But also about gas.Putin and Erdogan will have a crucial energy-related meeting at the G20 summit on November 15 in Turkey; and there’s an upcoming visit by Erdogan to Moscow. Bets are on that the Turk Stream agreement will be – finally – reached before the end of the year. And on northern Syria, Erdogan has been forced to admit by Russian facts on the ground and skies that his no-fly zone scheme will never fly.
  • That leaves us with the much larger problem: the House of Saud.There’s a wall of silence surrounding the number one reason for Saudi Arabia to bomb and invade Yemen, and that is to exploit Yemen’s virgin oil lands, side by side with Israel – no less. Not to mention the strategic foolishness of picking a fight with redoubtable warriors such as the Houthis, which have sowed panic amidst the pathetic, mercenary-crammed Saudi army.Riyadh, following its American reflexes, even resorted to recruiting Academi – formerly Blackwater - to round up the usual mercenary suspects as far away as Colombia.It was also suspected from the beginning, but now it's a done deal that the responsible actor for the costly Yemen military disaster is none other than Prince Mohammad bin Salman, the King’s son who, crucially, was sent by his father to meet Putin face-to-face.
  • Meanwhile, Qatar will keep crying because it was counting on Syria as a destination point for its much-coveted gas pipeline to serve European customers, or at least as a key transit hub on the way to Turkey.Iran on the other hand needed both Iraq and Syria for the rival Iran-Iraq-Syria gas pipeline because Tehran could not rely on Ankara while it was under US sanctions (this will now change, fast). The point is Iranian gas won’t replace Gazprom as a major source for the EU anytime soon. If it ever did, or course, that would be a savage blow to Russia.
  • In oil terms, Russia and the Saudis are natural allies. Saudi Arabia cannot export natural gas; Qatar can. To get their finances in order – after all even the IMF knows they are on a highway to hell - the Saudis would have to cut back around ten percent of production with OPEC, in concert with Russia; the oil price would more than double. A 10 percent cutback would make a fortune for the House of Saud.So for both Moscow and Riyadh, a deal on the oil price, to be eventually pushed towards $100 a barrel, would make total economic sense. Arguably, in both cases, it might even mean a matter of national security.But it won’t be easy. OPEC’s latest report assumes a basket of crude oil to be quoted at only $55 in 2015, and to rise by $5 a year reaching $80 only by 2020. This state of affairs does not suit either Moscow or Riyadh.
  • Meanwhile, fomenting all sorts of wild speculation, ISIS/ISIL/Daesh still manages to collect as much as $50 million a month from selling crude from oilfields it controls across “Syraq”, according to the best Iraq-based estimates.The fact that this mini-oil caliphate is able to bring in equipment and technical experts from “abroad” to keep its energy sector running beggars belief. “Abroad” in this context means essentially Turkey – engineers plus equipment for extraction, refinement, transport and energy production.One of the reasons this is happening is that the US-led Coalition of the Dodgy Opportunists (CDO) – which includes Saudi Arabia and Turkey - is actually bombing the Syrian state energy infrastructure, not the mini oil-Caliphate domains. So we have the proverbial “international actors” in the region de facto aiding ISIS/ISIL/Daesh to sell crude to smugglers for as low as $10 a barrel.Saudis – as much as Russian intel - have noted how ISIS/ISIL/Daesh is able to take over the most advanced US equipment that takes months to master, and instead integrate it into their ops at once. This implies they must have been extensively trained. The Pentagon, meanwhile, sent and will be sending top military across “Syraq” with an overarching message: if you choose Russia we won’t help you.ISIS/ISIL/Daesh, for their part, never talks about freeing Jerusalem. It’s always about Mecca and Medina.
  •  
    Pepe Escobar brings us up to speed on big changes in the Mideast, including the decline of U.S. influence. Not mentioned, but the Saudis' feelings of desertion by the Washington Beltway and its foreplay with Russia could bring about an end to the Saudis insistence on being paid for oil in U.S. dollars, and there goes the western economy. 
« First ‹ Previous 141 - 160 of 170 Next ›
Showing 20 items per page